General

  • Target

    Output.exe

  • Size

    3.0MB

  • Sample

    241207-h1w6qs1rev

  • MD5

    8c33199388f8894532909836f3f4d3e1

  • SHA1

    11bdbb98163accd6bfac16585062fd573e5b5a48

  • SHA256

    8930244d360f2da7f1b4dad68a59d5d768e78b4256da9751055ee541d45da616

  • SHA512

    e0a3603e257196332b494ed88b86237194a2b6c99722f141d727e0ecf7a86fb88c6bd717bfa36a1f4adfa6c6bffcde46f1057c50dee9ba89e9b7eecd673ef026

  • SSDEEP

    98304:Y9unatJkJ46aQ86+LH8w5j3ylWtx8vKipHK9w3Dor:Ra3A8DLcgyWyvnFK9wzo

Malware Config

Targets

    • Target

      Output.exe

    • Size

      3.0MB

    • MD5

      8c33199388f8894532909836f3f4d3e1

    • SHA1

      11bdbb98163accd6bfac16585062fd573e5b5a48

    • SHA256

      8930244d360f2da7f1b4dad68a59d5d768e78b4256da9751055ee541d45da616

    • SHA512

      e0a3603e257196332b494ed88b86237194a2b6c99722f141d727e0ecf7a86fb88c6bd717bfa36a1f4adfa6c6bffcde46f1057c50dee9ba89e9b7eecd673ef026

    • SSDEEP

      98304:Y9unatJkJ46aQ86+LH8w5j3ylWtx8vKipHK9w3Dor:Ra3A8DLcgyWyvnFK9wzo

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Async RAT payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Drops file in Drivers directory

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks